Security restrictions bypass in Siemens products



Published: 2017-10-04
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2017-12736
CWE-ID CWE-284
Exploitation vector Local network
Public exploit N/A
Vulnerable software
Subscribe
RUGGEDCOM ROS
Server applications / SCADA systems

Scalance X Switches Firmware
Client/Desktop applications / Other client software

Vendor Siemens

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Security restrictions bypass

EUVDB-ID: #VU8670

Risk: Low

CVSSv3.1: 7.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-12736

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a adjacent attacker to bypass security restrictions on the target system.

The weakness exists due to improper access controls in the RCDP implementation that is used by Siemens Ruggedcom ROS-based devices and Siemens Scalance X switch models. An adjacent attacker on the same collision or broadcast domain as the target system can bypass security restrictions, gain unauthorized access and perform administrative actions.

Mitigation

Update RUGGEDCOM ROS to version 4.3.4 or 5.0.1.
Update Scalance X Switches Firmware to version 3.0 or 6.1.

Vulnerable software versions

RUGGEDCOM ROS: 4.3.0 - 5.0.0

Scalance X Switches Firmware: 2.0 - 6.0

External links

http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-856721.pdf


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###